SECURED DATA AGGREGATION METHODS IN WIRELESS SENSOR NETWORKS USING HOMOMORPHIC OPERATION - A REVIEW

Authors

  • Shahina K Department of Computing Science and Engineering, VIT University, Chennai, Tamil Nadu, India
  • Vaidehi Vijayakumar Department of Computing Science and Engineering, VIT University, Chennai, Tamil Nadu, India

DOI:

https://doi.org/10.22159/ajpcr.2017.v10s1.19749

Keywords:

Data aggregation, Homomorphic encryption, Wireless sensor networks, Data integrity, Data confidentiality

Abstract

Wireless sensor networks are energy constrained. Data aggregation is an important mechanism for achieving energy efficiency in such networks. The aggregation reduces redundancy in data transmission which results in improved energy usage. Several security issues are there in data aggregation, which includes data confidentiality, data integrity, availability, and freshness. Such issues become complex since WSN is deployed in hostile and unattended environment. So the sensor nodes may fail and compromised by adversaries. Secured data aggregation in sensor network is a topic of research.  Many solutions are proposed for secured data aggregation, using different encryption methods. Homomorphic encryption is one of such technique. In homomorphic encryption, all the nodes participate in the aggregation. Here, nodes can't see any intermediate or final result but the aggregation is efficient. In this paper, secured data aggregation methods are classified and the performance is compared in terms of integrity and confidentiality.

Downloads

Download data is not yet available.

References

Akyildiz F, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor networks: A survey. Elsevier Comput Netw 2002;38(4):393-422.

Parli BH, Narayan SS. Security issues in wireless sensor networks: Current research and challenges. International Conference on Advances in Computing, Communication and Automation (ICACCA) IEEE; 2016. p. 1-6.

Tahir H, Asim S. Wireless sensor network: A security perspective. Multitopic Conference, IEEE International; 2008.

Wan S, Zhang Y, Chen J. On the construction of data aggregation tree with maximizing lifetime in large-scale wireless sensor networks. IEEE Sensors J 2016;16(20):7433-40.

Ranjan R, Karmore SP. Survey on secured data aggregation in wireless sensor network. IEEE Sponsored 2nd International Conference on Innovations in Information Embedded and Communication Systems; 2015.

Krithika S, Preshiya DJ. Enhanced data aggregation techniques for com-promised node attacks in wireless sensor networks. IEEE WiSPNET Conference; 2016.

Sethi H, Devendra P, Patel RB. EIRDA: An energy efficient interest based reliable data aggregation protocol for wireless sensor networks. Int J Comput Appl 2011;22(7):20-5.

Gaikwad S, Kulkarni UV. Comparative analysis of hop-to-hop and end-to-end secure communication. Int J Adv Res Technol 2013;2(7):473-7.

Ertaul L, Yang JH, Saldamli G. Analyzing homomorphic encryption schemes in securing wireless sensor networks. IJCSNS Int J Comput Sci Netw Secur 2015;15(5):1-11.

Ozdemir S, Xiao Y. Integrity protecting hierarchical concealed data aggregation for wireless sensor networks. Int J Comput Telecommun Netw 2011;55:1735-46.

Chen CM, Lin YH, Lin YC, Sun HM. RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks. IEEE Tans Parallel Distrib Syst 2012;23(4):81-6.

Rafik O, Mohammed F. SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks using Stateful Public Key Cryptography. IEEE Conference Publications; 2013.

Zhou Q, Yang G, He L. An efficient secure data aggregation based on homomorphic primitives in wireless sensor networks. Int J Distrib Sensor Netw 2014;7:11.

Li X, Chen D, Li C, Wang L. Secure data aggregation with fully homomorphic encryption in largescale wireless sensor networks. Sensors 2015;15:952-73.

Published

01-04-2017

How to Cite

K, S., and V. Vijayakumar. “SECURED DATA AGGREGATION METHODS IN WIRELESS SENSOR NETWORKS USING HOMOMORPHIC OPERATION - A REVIEW”. Asian Journal of Pharmaceutical and Clinical Research, vol. 10, no. 13, Apr. 2017, pp. 328-32, doi:10.22159/ajpcr.2017.v10s1.19749.

Issue

Section

Original Article(s)